DarthRa / LinuxMalwareSourceCodeLinks
This is a repository of the source code of various malware targeting the *nix (mostly Linux) operating systems.
☆14Updated 9 years ago
Alternatives and similar repositories for LinuxMalwareSourceCode
Users that are interested in LinuxMalwareSourceCode are comparing it to the libraries listed below
Sorting:
- Reversed source code to the Babuk ransomware builder.☆17Updated 4 years ago
- Reversed source code of the Babuk Ransomware Version 1☆20Updated 4 years ago
- Malicious Software SRC Extract☆32Updated 3 years ago
- Conti Ransomware Source Code☆19Updated 3 years ago
- Sourcecode of Infostealer.Dexter POS Malware and C&C☆47Updated 9 years ago
- Decompiled NotPetya File Encryptor Code☆17Updated 3 years ago
- Simple class to search and upload files☆28Updated 6 years ago
- LOJAX ROOTKIT (UEFI) +PDF Included[x]☆36Updated 2 years ago
- Well, I have created this shit for educational pruposes (I think)☆38Updated 3 years ago
- Community driven computer worm☆69Updated 3 years ago
- Cryline project - It's a simple test ransomware for Windows OS without stable encryption. Pls use this source code for study purposes on…☆58Updated 8 months ago
- The source code of the Zeus Evolution botnet that used TOR.☆61Updated 8 years ago
- The Mirai malware modified for use on NCL/a virtual/simulated environment.☆48Updated 3 years ago
- Feature-rich Post Exploitation Framework with Network Pivoting capabilities.☆92Updated 4 years ago
- Shutdown 2017 Malware (Worm - Ransomware - Rogue Security Software) - Includes AHXR-ScreenLock (Screen Lock Builder - Kills Task Manager…☆60Updated 8 years ago
- Persistent & Undetectable Malware Backdoor☆28Updated last year
- Demonstrate about file-less malware approach using JavaScript☆53Updated 8 years ago
- A C ransomware(educational only)☆22Updated 3 years ago
- Agent Tesla Spyware C2 Exploit [PATCHED]☆32Updated 7 years ago
- ☆28Updated 4 years ago
- A Linux Cyptomining malware☆38Updated 2 years ago
- My (OLD) RE Take On The Faux Green Petya Ransomware Builder & Client.☆20Updated 4 years ago
- The payload will search for specific files in desktop then upload them as *zip to your web server☆37Updated 6 years ago
- Fully Undetectable Native C++ Remote Access Agent / Botnet.☆93Updated 5 years ago
- Information Stealers Wall of Sheep (IS-WOS)☆11Updated 5 years ago
- EXXX EVASION | Metasploit Antivirus Evasion | Fully Undetectable Payloads☆29Updated 5 years ago
- ☆35Updated 5 years ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆33Updated 6 years ago
- This is the published source code from the Worm Locker2.0 ransomware. Please open the README file in a zip file for more information.☆14Updated 5 years ago
- Bash Script with 4 ways to get persistence in Linux systems WITHOUT root permisions☆17Updated 3 years ago